TECHNICAL FIELDThis invention generally relates to electronic signatures and, more particularly, to an electronic writing instrument having a fingerprint scanner incorporated therein, wherein fingerprint data obtained by the fingerprint scanner is used to create an electronic signature.[0001]
BACKGROUNDAs enterprises move from paper-based systems to more economical paperless environments, new barriers are presented that must be overcome with new technology. Business transactions, agreements and authorizations are some examples of events that require one or more person's assent, evidenced by that person's signature, that must be electronically perpetuated in a paperless system. Perpetuation is required to maintain the commercial quality of permanence that is required to support audit, evidentiary and enforcement requirements.[0002]
In October 2000, the federal Electronic Signatures in Global and National Commerce Act (also known as “E-Sign”) was enacted. The new law broadly authorizes electronic records and electronic signatures as being legally effective. The existence of this new law makes business transactions conducted electronically easier to enforce. Therefore, a major barrier for conducting electronic business transactions has been removed, and greater proliferation of electronic business transactions will no doubt be seen in the marketplace.[0003]
Typically, electronic signatures are applied to electronic documents within a user's computer. After the electronic signature is appended to an electronic document, the electronic document is electronically transmitted to another computer, where the electronic document may be processed further or stored.[0004]
While many solutions have been found to store and process electronic documents with electronic signatures, problems still exist because many business transactions, although conducted electronically, still require a user to physically affix a user signature to a document, either an electronic document or a paper document. Translating a physical signature into an electronic signature and incorporating uniquely identifying features into the physical signature so it can be used to verify documents presents new problems to overcome.[0005]
SUMMARYSystems and methods are described herein for scanning a fingerprint to use in uniquely identifying a handwritten signature. An electronic writing instrument includes a finger pad on which a user's finger rests when the user is writing with the electronic writing instrument. A fingerprint scanner located in the writing instrument is configured to scan a fingerprint of the user that rests on the finger pad. A feature identifier is configured to identify particular features of the scanned fingerprint.[0006]
The fingerprint features are converted into a code, specifically, a private key code. Since the fingerprint is unique to the user, the private key code derived from the fingerprint is also unique to the user. Therefore, the private key code may be used to uniquely identify the user. A public key code is derived from the private key by some known method, e.g., encrypting the private key code with a previously selected password.[0007]
The public key code is then transmitted to a computing device, either via a wired or a wireless link. In one implementation, the data obtained from the fingerprint scanner is transmitted to the computing device, where the data is converted into a private key code and the public key code is created.[0008]
The electronic writing instrument is designed to capture the fingerprint data as the user signs the user's signature. The signature may be signed on paper (or some similar medium) or electronically (on an electronic signature pad, a touch screen, etc.) If the signature is signed on paper, then the paper document is scanned into the computing device.[0009]
An electronic signature module in the computing device creates an electronic signature from the public key code and attaches the electronic signature to the document. In one implementation, a digital representation of the signature is stored with the document in the appropriate location. Thereafter, the electronic signature may be used to verify that the person identified by the electronic signature signed the document, and that the document has not been changed since it was signed.[0010]
BRIEF DESCRIPTION OF THE DRAWINGSThe present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings. The same numbers are used throughout the figures to reference like components and/or features.[0011]
FIG. 1 is an illustration of an electronic writing instrument that incorporates a fingerprint scanner.[0012]
FIG. 2 is a block diagram of an electronic writing instrument that includes a fingerprint scanner.[0013]
FIG. 3 is a block diagram of an electronic writing instrument that includes a fingerprint scanner and a computing device used with the writing instrument.[0014]
FIG. 4 is a flow diagram depicting a method for scanning a fingerprint to determine a private key code that is used to create an electronic signature.[0015]
DETAILED DESCRIPTIONThe following description sets forth one or more specific implementations and/or embodiments of an electronic writing instrument with a fingerprint scanner and methods use with electronic signatures. The systems and methods incorporate elements recited in the appended claims. These implementations are described with specificity in order to meet statutory written description, enablement, and best-mode requirements. However, the description itself is not intended to limit the scope of this patent.[0016]
Also described herein are one or more exemplary implementations of an electronic writing instrument with a fingerprint scanner and methods use with electronic signatures. Applicant intends these exemplary implementations to be examples only. Applicant does not intend these exemplary implementations to limit the scope of the claimed present invention(s). Rather, Applicant has contemplated that the claimed present invention(s) might also be embodied and implemented in other ways, in conjunction with other present or future technologies.[0017]
Computer-Executable Instructions[0018]
An implementation of an electronic writing instrument with a fingerprint scanner and/or method for use with electronic signatures may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments.[0019]
Computer-Readable Media[0020]
An implementation of an electronic writing instrument with a fingerprint scanner and/or methods of use with electronic signatures may be stored on or transmitted across some form of computer-readable media. Computer-readable media can be any available media that can be accessed by a computer. By way of example, and not limitation, computer readable media may comprise “computer storage media” and “communications media.”[0021]
“Computer storage media” include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.[0022]
“Communications media” typically embodies computer-readable instructions, data structures, program modules, or other data in a modulated data signal, such as carrier wave or other transport mechanism. Communication media also includes any information delivery media.[0023]
Exemplary Electronic Writing Instrument[0024]
FIG. 1 is an illustration of an[0025]electronic writing instrument100 configured for use with electronic signatures. Theelectronic writing instrument100 includes abody102 and has anib104 at an end of thebody102. Thenib104 may simply be a narrowed, or pointed, end of thebody102, or thenib104 may be a ball in the event that theelectronic writing instrument100 is a ballpoint pen. Depending on the implementation of theelectronic writing instrument100, thenib104 may take many different forms.
The[0026]electronic writing instrument100 also includes afinger pad106 upon which a user's finger (not shown) rests when the user is writing with theelectronic writing instrument100. Thefinger pad106 is positioned in such a way that at least a part of a fingerprint portion (not shown) of the user's finger (not shown) lays flat against thefinger pad106. As a result, afingerprint scanner108 positioned inside thebody102 of theelectronic writing instrument100 may scan the part of the fingerprint portion of the user's fingerprint. The features and function of theelectronic writing instrument100 will be discussed in greater detail below.
FIG. 2 is a block diagram of an[0027]electronic writing instrument200 similar to that shown and described in FIG. 1. Theelectronic writing instrument200 includes afinger pad202, afingerprint scanner203 and ascanner driver204. As previously discussed, thefinger pad202 is positioned in such a way that a user's finger rests upon thefinger pad202 when the user is writing with theelectronic writing instrument200.
The[0028]fingerprint scanner203 is integrated with—or closely associated to—thefinger pad202. Thefingerprint scanner203 is configured to scan thefinger pad202 when the user is signing a physical signature with theelectronic writing instrument200. Thefingerprint scanner203 may scan thefinger pad202 during the signing process or approximately contemporaneously thereto. Any timing of the scanning that assures that data received as a result of the scan can be reliably matched to a user and the user's signature may be implemented within the scope of the present invention. Thescanner driver204 includes the software necessary to operate the scanning and the timing of thescanner203.
The[0029]electronic writing instrument200 also includes afeature identifier206 and aconverter208. Thefeature identifier206 is configured to identify fingerprint data representing select features of a scanned fingerprint, e.g., whorls, vortices, etc. The select features identified by thefeature identifier206 must be sufficient to distinguish one scanned fingerprint from any other scanned fingerprint. In other words, thefeature identifier206 must identify a sufficient number of fingerprint features to uniquely identify a user based on the identified fingerprint features.
The[0030]converter208 is configured to convert the fingerprint data into a private key code that is a code associated with the user that uniquely identifies the user among private key codes of other users derived in the same manner using commonly known fingerprint identification schemes. This could also . . . whorls . . . or arbitrarily assign key and associate
For instance, if the[0031]fingerprint data206 represents twenty (20) identified features of a fingerprint, then the private key code may be a twenty-digit number (base 10), each digit representing a certain degree of the fingerprint feature that is associated with the digit. As a practical matter, the private key code must be long enough to uniquely identify a universe of potential users of theelectronic writing instrument200.
The[0032]electronic writing instrument200 also contains, in the alternative, atransmitter210 and anantenna212 used by thetransmitter210, or an input/output (I/O)module214 and awired ling216 utilized by the I/O module214. The specific implementation depends on whether theelectronic writing instrument200 communicates with a computing device (not shown) via a wireless or a wired transmission link. The features and functions shown and described with respect to FIG. 2 will be discussed in greater detail, below, with respect to FIG. 3.
Exemplary Operational Environment[0033]
FIG. 3 is a block diagram of an exemplary[0034]operational environment300 for an electronic writing instrument that includes a fingerprint scanner for use with electronic signatures.
The[0035]operational environment300 is shown with acomputing device302, a fingerprintscanning writing instrument304 and ascanner306. The fingerprintscanning writing instrument304 is similar to theelectronic writing instruments100,200 shown in FIGS. 1 and 2, respectively. Thescanner306 is a document scanner that scans paper documents and creates electronic documents that are identical versions of the paper documents.
The[0036]computing device302 includes aprocessor308, adisplay310, an input/output (I/O)port312, acommunications port314 and awireless communications port316. Thewireless communications port316 is configured to receive data from the fingerprintscanning writing instrument304 via awireless link318, such as a radio frequency (RF) or infrared (IR) signal. It is noted, however, that the fingerprintscanning writing instrument304 may communicate with thecomputing device302 via a wired link (not shown) through thecommunications port316.
The[0037]computing device302 also includesmemory320 that stores anelectronic signature module322, anelectronic document324 including anelectronic signature326,fingerprint data328 and ascanner driver330 that drives thescanner306.
The[0038]electronic signature module322 is configured to control functions that manipulate (create, edit, append, delete, verify, etc.) theelectronic signature326 included with theelectronic document324. Thefingerprint data328 is stored in thememory320 after being received from the fingerprintscanning writing instrument304.
The[0039]memory320 of thecomputing device302 also stores aconverter332, a privatekey code334 and akey generator336. Thekey generator336 includes a publickey code338 and apassword340. It is noted that all the elements shown stored in thememory320 may not all be present in the110memory320 at any given time. Rather, some elements in thememory320 are not initially present, but are created and subsequently stored in thememory320. These elements will be identified and discussed further in the discussion that follows.
The[0040]memory320 of thecomputing device302 stores theconverter332, similar to theconverter208 previously discussed with regard to theelectronic writing instrument200 shown in FIG. 2 and having the same function. However, if theconverter332 stored in thecomputing device302 is utilized, the conversion of fingerprint data to the privatekey code338 takes place on thecomputing device302 instead of in theelectronic writing instrument200. This conversion may take place on thecomputing device302 or in the fingerprintscanning writing instrument304, depending on the desired implementation.
The[0041]electronic document324 may initially comprise a paper document (not shown). If so, the paper document may be scanned with thescanner306 to create theelectronic document324. After several processing steps, theelectronic signature module322 affixes theelectronic signature326 to theelectronic document324.
The[0042]converter332 converts thefingerprint data328 to derive the privatekey code324. Thekey generator336 encrypts the privatekey code334 with thepassword340 to create the publickey code338. It is noted, however, that any method known in the art for creating the publickey code338 from the privatekey code334 may be utilized.
Methodological Implementation of an Electronic Writing Instrument with a Fingerprint Scanner[0043]
FIG. 4 is a flow diagram depicting a methodological implementation of an electronic writing instrument used to scan a fingerprint to determine a private key code that is used to create an electronic signature. For discussion purposes, continuing reference will be made to the elements and reference numerals included in FIGS. 2 and 3.[0044]
At[0045]block400, a user signs a document with the fingerprintscanning writing instrument304 in one of several ways. The user may sign a paper document that is subsequently scanned to create theelectronic document324. Alternatively, the user may sign a paper document that is positioned on top of an electronic pad. As the signature is written on the paper document, the electronic signature (a physical representation of the signature) is recorded by the electronic pad and stored in thecomputing device302. Also, the user may sign a digital pad that creates and stores a physical representation of the signature in thecomputing device302 without creating a signed paper document.
At about the same time as the user signs the document, the[0046]scanner203 scans at least a portion of fingerprint of the user (block402) that contacts thefinger pad202 on theelectronic writing instrument200. During the scanning process, thefeature identifier206 identifies several fingerprint features found on the user's fingerprint. Such features may include whorls, vortices, etc., that when taken together, uniquely identify the fingerprint as belonging to the user. As many fingerprint features that are necessary to uniquely identify the fingerprint as belonging to the user (e.g., 10 to 20) are identified. The fingerprint features are represented as fingerprint data.
At[0047]block404, theconverter208 in theelectronic writing instrument200 or theconverter332 in thecomputing device302 converts thefingerprint data328 into the privatekey code334. Whether this conversion occurs in theelectronic writing instrument200 or thecomputing device302 depends on the specific implementation of the system. If theelectronic writing instrument200 transmits thefingerprint data328 to thecomputing device302 prior to converting thefingerprint data328 into theprivate key334 code, then theconverter332 in thecomputing device302 performs the conversion. However, the conversion may be done by theconverter208 in theelectronic writing device200, in which case, the privatekey code334 is transmitted from theelectronic writing device200 to thecomputing device302, where it is stored in thememory320.
The private[0048]key code334 is used to create the publickey code338 atblock406. This may be done by any method known in the art to create a public key from a private key such that encryption by the private key can be verified by analyzing the public key. In this example, this is accomplished by encrypting the privatekey code334 with apassword340 selected by the user.
At[0049]block408, theelectronic signature module322 creates theelectronic signature326. Theelectronic signature326 includes a number of bits from which the user's identity and the publickey code338 can be obtained. Various methods are known in the art for verifying the accuracy and authenticity of theelectronic document324 using these, and possibly other, pieces of information. Any of these methods may be used in the process described herein.
If the[0050]document324 initially comprises a paper document (“Yes” branch, block410), then the paper document is scanned atblock412 to create an electronic version of thedocument324 that is stored in thememory320 of thecomputing device302. If thedocument324 already exists as an electronic document (“No” branch, block410), then the scanning step is not required.
At[0051]block414, theelectronic signature module322 attaches theelectronic signature326 to theelectronic document324. This creates an electronically signeddigital document324 that may be transmitted to various parties online. A party receiving the signeddocument324 can use theelectronic signature326 and thedocument324 to verify that a sending party is who they claim to be. Also, the information is used to verify that thedocument324 has not been altered since theelectronic signature326 was applied to thedocument324.
CONCLUSIONImplementation of the systems and methods described herein provide a convenient way to uniquely identify a signer of an electronic or paper document and to create an electronic signature using the unique identification. In turn, attaching the electronic signature to the document provides a reliable method for verifying the accuracy and authenticity of the document.[0052]
Although the invention has been described in language specific to structural features and/or methodological steps, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or steps described. Rather, the specific features and steps are disclosed as preferred forms of implementing the claimed invention.[0053]